Jump to content
Search In
  • More options...
Find results that contain...
Find results in...


Recommended Posts



No matter what Elon Musk says about it, I don’t subscribe to Simulation hypothesis, the idea that we’re living in a Matrix of sorts. The recent Spectre/Meltdown computer security vulnerability got me thinking, though. If the universe doesn’t want us to escape it, it needs to protect its secrets. From this perspective, the Heisenberg Uncertainty Principle looks like an attempt by our simulators to prevent timing attacks against the universe. God may not play dice with the universe, as Einstein said, but one would assume He does use proper security practices.

Let’s start by examining the computer version of this, and then we’ll look at the analogous physical phenomena.

Timing attacks have been on the mind recently in computing. It turns out that the privacy of many of our processors can be violated with shocking ease using techniques called Spectre and Meltdown. Without going into excruciating detail — get off me, pedantic security nerds — the basic idea is that if you can create a timer, you can measure how long it takes the processor to perform a task. Once you can measure processor timings, you can time it looking up lots of different pieces of data and see which ones go faster than others. If a piece of data can be retrieved much more quickly than the others, it means the data required for that task was already sitting around in the processor cache, so the processor didn’t have to go fetch it from RAM, which takes a few thousand times longer.

If you can figure out what’s in the processor cache, you can infer data the operating system is using, which is supposed to be privileged so that user code (e.g. a website running in your browser, sending your personal information back to the Russian mob) doesn’t have access to it. This vulnerability is so pervasive and severe that some experts have said it invalidates the past two decades of processor design, along with a whole field called LangSec, or language security. Part of what makes this attack so pernicious is that as soon as you can create a sufficiently granular timer, you can replicate the attack.

Link to post
Share on other sites

Just a nostalgic look back of sending / receiving pictures via radio during the 1970's.  We take things for granted with Smartphones and computers, no big deal.  Back then videophones were experimental (land line).

"Memory" was crude to say the least and EXPENSIVE.  About $800 (1970's) bucks for 120 X 120 pixels (there's NO kilobytes then)

Welcome to 8 second SSTV.- sending / receiving images by SOUND not video.







Intro and demo of the technology


Link to post
Share on other sites

Just saw this on a new episode of "Strange Evidence - The Incident at Area 51" (2018)  The Science Channel

You'll need to close those ANNOYING ads! :angry:


It's not an alien flying saucer (really without a tarp :lol:)

An expert identified it as part of the X-47B Stealth Drone.

Goes to show everything is not as it appears.





Another sci-fi coming true "Stealth" (2005)


Link to post
Share on other sites

Watched "Mysteries at the Museum", fake healer Peter Popoff was busted by Bearcat police scanner:lol:


Same type on display at National Electronics Museum in Maryland.



Con man..




...busted by  world-famous magician and psychic investigator James Randi.



Remember, someone can be LISTENING! :D

Link to post
Share on other sites

Scientists DNA tested nine 'yeti' samples. They didn't find Bigfoot.


I'm watching "Bigfoot: The New Evidence - Yeti" on National Geographic.

One had a large brown bear in captivity and set up a camera to see how it walks. It double stepped, creating the perfect classic Bigfoot footprint.


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
© 2021 Turner Classic Movies Inc. A Time Warner Company. All Rights Reserved Terms of Use | Privacy Policy | Cookie Settings
  • Create New...